Search Header Logo

Digital Forensics Ch1-2

Authored by Christian De Jesus

Computers

University

Digital Forensics Ch1-2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The triad of computing security includes which of the following?

Vulnerability assessment, intrusion response, and monitoring

Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation

Vulnerability assessment, detection, and monitoring

Detection, response, and monitoring

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Digital forensics and data recovery refer to the same activities. True or False?

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Criminal proceedings in the United States must use procedures that adhere to which of the following?

Fourth Amendment

First Amendment

None of these choices

Third Amendment

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Policies can address rules for which of the following?

All of these choices

The amount of personal email you can send

The Internet sites you can or can't access

When you can log on to a company network from home

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A warning banner should contain information about ____________. (Choose all that apply.)

who owns the computer

who can use the site

the content of websites

consequences of misuse

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Under normal circumstances, a private-sector investigator is considered an agent of law enforcement. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When collecting computer components as evidence, you should place them in antistatic bags. True or False?

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?